Integrating encryption techniques for secure data storage in the cloud
暂无分享,去创建一个
Gautam Srivastava | Gautam Srivastava | Vivek Jaglan | Senthilkumar Mohan | Bijeta Seth | Surjeet Dalal | Dac‐Nhuong Le | Gautam Srivastava | Vivek Jaglan | Surjeet Dalal | Senthilkumar Mohan | Dac-Nhuong Le | Bijeta Seth
[1] VasilakosAthanasios,et al. Security and privacy challenges in mobile cloud computing , 2017 .
[2] Xiaohui Liang,et al. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems , 2016, IEEE Cloud Computing.
[3] Yulei Wu,et al. Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[4] Kim-Kwang Raymond Choo,et al. Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.
[5] Surjeet Dalal,et al. A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach , 2018, J. Cyber Secur. Mobil..
[6] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[7] Jun Wu,et al. Secure Transmission in Multi-Cell Multi-User Massive MIMO Systems With an Active Eavesdropper , 2019, IEEE Wireless Communications Letters.
[8] Ting Wu,et al. Large universe attribute based access control with efficient decryption in cloud storage system , 2018, J. Syst. Softw..
[9] A. P. Shanthi,et al. Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment , 2015, Inf. Secur. J. A Glob. Perspect..
[10] Li Xu,et al. A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[11] Xiaochun Cheng,et al. Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[12] Geyong Min,et al. Data-Driven Information Plane in Software-Defined Networking , 2017, IEEE Communications Magazine.
[13] GaniAbdullah,et al. The rise of "big data" on cloud computing , 2015 .
[14] Mosleh M. Abu-Alhaj,et al. Cloud Data Auditing Techniques with a Focus on Privacy and Security , 2017, IEEE Security & Privacy.
[15] Chunyuan Zhang,et al. HASG: Security and efficient frame for accessing cloud storage , 2018, China Communications.
[16] Richard O. Sinnott,et al. TruXy: Trusted Storage Cloud for Scientific Workflows , 2017, IEEE Transactions on Cloud Computing.
[17] Benjamin Fabian,et al. Secret Sharing for Health Data in Multi-provider Clouds , 2013, 2013 IEEE 15th Conference on Business Informatics.
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Manju Suresh,et al. Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things , 2016 .
[20] Adeel Anjum,et al. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..
[21] Hao Yan,et al. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[22] Zahir Tari,et al. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.
[23] Qiang Wei,et al. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment , 2018, Wirel. Commun. Mob. Comput..
[24] Bharat S. Rawal. Proxy re-encryption architect for storing and sharing of cloud contents , 2020, Int. J. Parallel Emergent Distributed Syst..
[25] K. Suveetha,et al. Ensuring Confidentiality of Cloud Data using Homomorphic Encryption , 2016 .
[26] Joel J. P. C. Rodrigues,et al. SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.
[27] AlamMasoom,et al. A survey of cloud computing data integrity schemes , 2017 .
[28] Shahid Mumtaz,et al. ECOSECURITY: Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet , 2019, IEEE Consumer Electronics Magazine.
[29] Samee Ullah Khan,et al. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party , 2017, IEEE Transactions on Cloud Computing.
[30] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[31] Joe Weinman,et al. The Economics of the Hybrid Multicloud Fog , 2017, IEEE Cloud Computing.
[32] Yulei Wu,et al. An Architecture for Accountable Anonymous Access in the Internet-of-Things Network , 2018, IEEE Access.
[33] Nan Nan,et al. An Operation Control Strategy for the Connected Maglev Trains Based on Vehicle-Borne Battery Condition Monitoring , 2018, Wirel. Commun. Mob. Comput..
[34] Ying Wang,et al. Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..